Book description
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.
Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.
Presented case studies cover:
- The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
- Different types of image steganographic schemes based on vector quantization
- Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior
Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Preface
- Acknowledgments
- Editor
- Contributors
- PART I Multimedia Mining and Classification
-
PART II Watermarking
- Chapter 4 Automatic Detection and Removal of Visible Image Watermarks
- Chapter 5 Digital Watermarking Based on Chaotic Map and Reference Register
- Chapter 6 Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking
- Chapter 7 Reversible Data-Hiding Techniques for Digital Images
- Chapter 8 Watermarking Based on Local Binary Pattern Operators
- Chapter 9 Authentication of JPEG Images Based on Genetic Algorithms
- Chapter 10 An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery
-
PART III Steganography
- Chapter 11 Survey of Image Steganography and Steganalysis
- Chapter 12 Digital Steganographic Schemes Based on Image Vector Quantization
- Chapter 13 Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System
- Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems
-
PART IV Forensics
- Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm
- Chapter 16 A Comparison Study on Copy-Cover Image Forgery Detection
- Chapter 17 Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities
- Chapter 18 Video Forensics
- Chapter 19 Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption
- Chapter 20 Behavior Modeling of Human Objects in Multimedia Content
- Index
Product information
- Title: Multimedia Security
- Author(s):
- Release date: December 2017
- Publisher(s): CRC Press
- ISBN: 9781351832816
You might also like
book
Wireless and Mobile Device Security
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on …
book
Hacking Exposed Wireless, Third Edition, 3rd Edition
Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network …
book
Network Attacks and Defenses
Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to …
book
Implementing Digital Forensic Readiness
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals …